Original: http://www.zhihu.com/question/21914899
Web Security related concepts
Familiar with the basic concepts (SQL injection, upload, XSS, CSRF, a word trojan, etc.).
Through keywords (SQL injection, upload, XSS, CSRF, a word trojan, etc.) to Google/secwiki;
Read "Proficient script hacker", although very old also have errors, but the introduction is still possible;
See some infiltration notes/video, understand the whole process of infiltration, can Google (infiltration notes, infiltration proc
Security researchers have called on Oracle Java 6 users to upgrade to Java 7 as soon as possible to avoid being a victim of active network attackers.
Timo Hirvonen, a senior analyst at F-secure, issued a security warning on Java 6 on Twitter this weekend, called CVE-2013-2463.
PoC for CVE-2013-2463 was released last week, now it's exploited in the wild. No patch for jre6... Uninstall or upgrade to JRE7 update 25.-Timo Hirvonen (@ TimoHirvonen) August 26,201 3
CVE-2013-2463 issues Oracle h
based on the general Vulnerability Evaluation System (CVSS) and provides detailed information required to quantify risks. This is an important feature that saves time and protects valuable assets. In the pre-defined PCI-DSS analysis of the target CIDR Block, the topology features provide a similar solution, you only need to click to select a network segment and run the analysis report.
RedSeal's products integrate vulnerability scanners from multiple well-known companies (such as
BlindElephant is a Web Application Fingerprinter program. Of course, it is similar to WhatWeb. However, it seems that WhatWeb cannot scan the plug-in.
(Qualys security researcher Patrick Thomas discussed the open-source Web application fingerprint engine BlindElephant at the Black Hat conference. BlindElephant is a tool that helps security experts and System Administrators identify all operations on servers, including any Web applications downloaded b
Windows 7 Security "]
Malware killer: zero-day attack
If the operating system is in a completely bug-free environment, limiting user permissions may be a relatively safe method. Unfortunately, the bug does not exist, which provides malware makers with the opportunity to explore new vulnerabilities that have not been patched, such as the notorious "zero-day attack ". The recently discovered OS X Kernel defect also emphasizes this point: Someone can bypass the permission mechanism through this vu
How to Set HTTPS policies for old browsers
A few days ago, a friend asked me: we all said we recommend using the Qualys SSL Labs tool to test SSL security. Why are some of the most powerful Security manufacturers having low scores? I think this problem should be resolved in two aspects:
The situation of domestic user terminals is complex. In many cases, the SSL security configuration is reduced to be compatible with more users;
Some major manufactu
Windows 10 Edge browser is more secure than IE 11
Bkjia.com integrated message: the security tragedy of IE browser does not need to be repeated. A large number of insecure instances have also led many people to switch to Chrome and Firefox. As the successor of IE browser, Edge browser is more functional and constantly improved. This browser uses a brand new UI and adds various new features. Compared with IE 11, this browser has few vulnerabilities and is highly secure.
The number of mont
This is a creation in
Article, where the information may have evolved or changed.
The Go programming language makes it easy-to-write and deploy servers offering HTTPS (HTTP + Transport Layer Security) to Clients. The crypto package in Go's standard library are easy-to-use and well Documented:it's an under-explored gem. Due to it's low-on-legacy implementation of modern standards and easy configurability, there are no reason to insert Apa Che or Nginx server to terminate TLS connections. A Go App
for the key.Copy CodeThe code is as follows:server {Listen 80;server_name konklone.com;Return 301 https://$host $request_uri;}server {Listen 443 SSL;server_name konklone.com;SSL_CERTIFICATE/PATH/TO/UNIFIED.CRT;Ssl_certificate_key/path/to/my-private-decrypted.key;}# for a more complete, secure config:# https://gist.github.com/konklone/6532544You can get a more comprehensive nigix configuration, he opens the SPDY, HSTS, SSL session resumption, and Perfect Forward secrecy.The
vulnerability could result in remote code execution, which could allow an attacker to gain full control of the system.Proof of vulnerabilityIn our tests, we wrote a POC, and when we sent a well-structured email to the server, we were able to get the shell of the remote Linux server, bypassing all the protections currently on 32-bit and 64-bit systems (such as Aslr,pie and NX).What can we do?Patching the operating system in time, we (Qualys) have work
* () function to initiate a DNS request that converts the host name to an IP address.Vulnerability HazardThis vulnerability could result in remote code execution, which could allow an attacker to gain full control of the system.Proof of vulnerabilityIn our tests, we wrote a POC, and when we sent a well-structured email to the server, we were able to get the shell of the remote Linux server, bypassing all the protections currently on 32-bit and 64-bit systems (such as Aslr,pie and NX).What can we
vulnerabilities is usually from the cvss points of view. Although Cvss has a significant effect in terms of rapid vulnerability prioritization and screening vulnerabilities, the sorting speed is often based on the circumstances in which the enterprise has localized its configuration.
Cvss is a powerful monitoring tool, but all the metrics relied on to score are very general. In order to achieve the highest monitoring efficiency, it is necessary to localize the CVSS to a specific environment. B
to HT TPS to keep everyone safe on the web.LockIn the coming weeks, we'll publish detailed best practices (we'll add a link to it from here) to make TLS adoption easier, And to avoid common mistakes. Here is some basic tips to get started:Decide the kind of certificate you need:single, multi-domain, or wildcard certificateUse 2048-bit key certificatesUse relative URLs for resources this reside on the same secure domainUse protocol relative URLs for all other domainsCheck out We Site move articl
OpenSMTPD bug found LibreSSL Vulnerability
Qualys researchers want to see If OpenSMTPD (open-source SMTP protocol implementation) has a remote code execution vulnerability and cannot be found, so they want to check the library file's C Function malloc () s and free () s, results of a memory overflow (CVE-2015-5333) and a Buffer Overflow Vulnerability (CVE-2015-5334) found in OpenSSL alternative LibreSSL ). The LibreSSL team has released the fix.
Ope
Red Hat Linux fixes vulnerabilities in the "libuser" Library
Red Hat has fixed two vulnerabilities in the "libuser" library, which can be exploited by a local attacker to escalate permissions to the root user.
The libuser Library provides an interface for operating and managing users and group accounts. This software package is installed in Red Hat Enterprise Linux (RHEL) by default, while other Linux distributions come from the Red Hat code library.
The vulnerability was discovered by
Google will improve the ranking of HTTPSSSL websites. How can we make websites correctly use the SSL security protocol? Google provides several suggestions.
Google will improve the ranking of websites using HTTPS/SSL,How can I make websites correctly use the SSL security protocol? Google provides several suggestions.
Select the type of certificate you need: single domain, multi-domain, General Certificate
Use a 2048-bit encrypted Certificate
Use relative URLs for resources under the same securi
In recent years, I have written many articles about HTTPS and HTTP/2, covering all aspects of certificate applications, Nginx compilation and configuration, and performance optimization. In the comments of these articles, a lot of readers raised a variety of questions, my mailbox also often received similar mail. This article is used to list some of the issues that are representative and I know the solution.In order to control the length, this article as far as possible only to give the conclusi
modified, starting with 1.3. version1.3 (17september2013) Thefollowingchangesweremadeinthisversion:?recommend Replacing1024-bitcertificatesstraightaway.? recommendagainstsupportingsslv3.? removetherecommendationtouserc4tomitigatethebeast attackserver-side.? recommendthatrc4isdisabled.? recommendthat3desisdisabledinthenearfuture.? WarnabouttheCRIMEattackvariations (Timeandbreach).? recommendsupportingforwardsecrecy.? adddiscussionofecdsacertificates. Thanks for the valuable feedback and the draf
How to Set HTTPS policies for old browsers
A few days ago, a friend asked me: we all said we recommend using the Qualys SSL Labs tool to test SSL security. Why are some of the most powerful Security manufacturers having low scores? I think this problem should be resolved in two aspects:The situation of domestic user terminals is complex. In many cases, the SSL security configuration is reduced to be compatible with more users. There are indeed some la
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.